IT Professional

Issue 2 • Mar./Apr. 2018

Filter Results

Displaying Results 1 - 23 of 23
  • House Advertisement 
  • Membership [Advertisement]

    Publication Year: 2018, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Masthead 
  • [Masthead]

    Publication Year: 2018, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • House Advertisement 
  • CS Information

    Publication Year: 2018, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • From the Editors 
  • Thinking Critically about Algorithmic Thinking

    Publication Year: 2018, Page(s):5 - 10
    Request permission for commercial reuse | PDF file iconPDF (479 KB)
    Freely Available from IEEE
  • IT Trends 
  • Blockchain in Developing Countries

    Publication Year: 2018, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    A large proportion of the population in the developing world can benefit from blockchain. In this article, the authors discuss key concerns that have been raised regarding institutions in the developing world and evaluate the potential role of blockchain to address them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet of Things 
  • Enabling Trust and Security: TIPPSS for IoT

    Publication Year: 2018, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    The Internet of Things (IoT) has gone from hype to abject reality, and its ubiquity is growing. Ensuring TIPPSS for IoT (Trust, Identity, Privacy, Protection, Safety, and Security) is critical to protect people, devices, infrastructure, and cities in our hyper-connected world. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spotlight 
  • The 2018 Winter Olympics: A Showcase of Technological Advancement

    Publication Year: 2018, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB)

    The 2018 Winter Olympics in Pyeongchang was a showcase of South Koreas technological advancement and sophistication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Student Membership [Advertisement]

    Publication Year: 2018, Page(s): 26
    Request permission for commercial reuse | PDF file iconPDF (4117 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Financial Technologies and Applications

    Publication Year: 2018, Page(s):27 - 33
    Request permission for commercial reuse | PDF file iconPDF (401 KB)
    Freely Available from IEEE
  • Financial Technologies and Applications 
  • The use of big data analytics to predict the foreign exchange rate based on public media: A machine-learning experiment

    Publication Year: 2018, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB)

    The authors analyze relevant public information provided by new media to predict the movement of the USD/TWD exchange rate and explore whether big data analytics with machine-learning modeling can exceed the random walk mechanism and the notion of market efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Analyze Data from Unlisted but Rich Firms: From the Perspective of Data and Analysis

    Publication Year: 2018, Page(s):42 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (805 KB)

    This article illustrates the importance of gathering and analyzing preprocessing data for unlisted but rich firms such as venture capital firms. Using datasets from three major sources, the authors demonstrate how to query and analyze data using both Datastream and SQL. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Evolving Payments Landscape: Technological Innovation in Payment Systems

    Publication Year: 2018, Page(s):53 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB)

    Established financial institutions and their technology partners are contributing significantly to financial technology innovation in the payments market. This article provides a holistic overview of the technological innovations and challenges in the evolving payments landscape. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Articles 
  • To Blockchain or Not to Blockchain: That Is the Question

    Publication Year: 2018, Page(s):62 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Blockchain has been considered a breakthrough technology-but does your company need it? In this article, the authors discuss the advantages and disadvantages of blockchain technology using examples from the insurance sector, which can be generalized and applied to other sectors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Interface [Advertisement]

    Publication Year: 2018, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (732 KB)
    Freely Available from IEEE
  • Cybersecurity 
  • Bad Security Metrics Part 2: Solutions

    Publication Year: 2018, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    The author presents six principles to help avoid bad security metrics problems and move forward using sound measurement. This is the second part of a two-part series. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Life in the C-Suite 
  • What Executives Should Know About Technology Trends

    Publication Year: 2018, Page(s):80 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    This installment of Life in the C-Suite presents a sampling of comments from executives collected by Villanova University over the past few years as part of ongoing research on technology trends, digital transformation, and technology adoption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student Forum 
  • Could a coding bootcamp experience prepare you for industry?

    Publication Year: 2018, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB)

    Coding bootcamps are springing up around the world, purporting to offer a faster or easier route into the software development industry. The author evaluates the factors that potential bootcamp participants should consider in deciding whether a bootcamp experience might be a viable option. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extreme Automation 
  • Extreme Automation: A New Game-Changing Technology

    Publication Year: 2018, Page(s):88 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Extreme automation is a new IT model that can be used to describe the seamless communication between all levels of smart factory automation to a fully connected and flexible manufacturing system-one that can use a constant stream of data from connected operations and production systems to learn and adapt to new demands. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Economics 
  • Rural e-Commerce in Developing Countries

    Publication Year: 2018, Page(s):91 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    In recent years, there has been increased participation in e-commerce activities among rural communities in developing countries. Despite this progress, e-commerce in developing countries has been a highly urban-oriented phenomenon. The author analyzes the factors behind the rural-urban disparity in e-commerce in developing countries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Skillchoice [Advertisement]

    Publication Year: 2018, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Jobs [Advertisement]

    Publication Year: 2018, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (3324 KB)
    Freely Available from IEEE
  • myCS [Advertisement]

    Publication Year: 2018, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1741 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Irena Bojanova
NIST
irena.bojanova@computer.org